Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 02 Jul 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wegia
Wegia wegia |
|
| CPEs | cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Wegia
Wegia wegia |
Mon, 23 Jun 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Jun 2025 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WeGIA is a web manager for charitable institutions. Prior to version 3.4.2, an OS Command Injection vulnerability was identified in the /html/configuracao/debug_info.php endpoint. The branch parameter is not properly sanitized before being concatenated and executed in a shell command on the server's operating system. This flaw allows an unauthenticated attacker to execute arbitrary commands on the server with the privileges of the web server user (www-data). This issue has been patched in version 3.4.2. | |
| Title | WeGIA OS Command Injection in debug_info.php parameter 'branch' | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-06-23T17:00:13.496Z
Reserved: 2025-06-13T19:17:51.728Z
Link: CVE-2025-50201
Updated: 2025-06-23T16:59:58.941Z
Status : Analyzed
Published: 2025-06-19T04:15:49.340
Modified: 2025-07-02T16:21:03.237
Link: CVE-2025-50201
No data.
OpenCVE Enrichment
No data.